That's Right, Well Done! You Sure Know How To Keep Your Online Identity Safe

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

That’s right, well done!

You sure know how to keep your online


identity safe.

When choosing a username, it’s important not to reveal any personal


information. It should be something appropriate and respectful and
should not lead strangers to think you are an easy target for
cybercrimes or unwanted attention.

Some other useful tips to help you generate your username: 

 Don’t use your full name or parts of your address or phone


number.
 Don’t use your email username.
 Don’t use the same username and password combination,
especially on financial accounts.
 Don’t choose a super-odd username and then reuse it again
and again — it makes you easier to track.
 Don’t choose a username that gives clues to your passwords
such as a series of numbers/letters or the first part of a two-
part phrase, such as knock-knock or starlight, or the
department in which you work, such as IT.
 Do choose a username that’s appropriate for the type of
account, i.e., business, social or personal.

1.1.3 Your Online Identity

It’s your first day on the job, and it’s time to choose a username for
your online identity. Which of the following options would you choose?

jdoe

j.doe12
1.1.5 Where Is Your Data?

This has got you thinking. Only yesterday, you shared a couple of
photos of your first day on the job with a few of your close friends. But
that should be OK, right? Let’s see…

You took some photos at work on your mobile phone. Copies of these
photos are now available on your mobile device.

You shared these with five close friends, who live in various locations
across the world.

All of your friends downloaded the photos and now have copies of
your photos on their devices.

One of your friends was so proud that they decided to post and share
your photos online. The photos are no longer just on your device.
They have in fact ended up on servers located in different parts of the
world and people whom you don’t even know now have access to
your photos.
1.1.6 What's More...

This is just one example that reminds us that every time we collect or
share personal data, we should consider our security. There are
different laws that protect your privacy and data in your country. But
do you know where your data is?

1.Following an appointment, the doctor will update your medical


record. For billing purposes, this information may be shared with the
insurance company. In such cases, your medical record, or part of it,
is now accessible at the insurance company.

2.Store loyalty cards may be a convenient way to save money on your


purchases. However, the store is using this card to build a profile of
your purchasing behavior, which it can then use to target you with
special offers from its marketing partners.

1.1.7 Smart Devices

Consider how often you use your computing devices to access your
personal data. Unless you have chosen to receive paper statements,
you probably access digital copies of bank account statements via
your bank’s website. And when paying a bill, it’s highly likely that
you’ve transferred the required funds via a mobile banking app.

But besides allowing you to access your information, computing


devices can now also generate information about you.

Wearable technologies such as smartwatches and activity trackers


collect your data for clinical research, patient health monitoring, and
fitness and wellbeing tracking. As the global fitness tracker market
grows, so also does the risk to your personal data.
It might seem that information available online is free. But is privacy
the price we pay for this digital convenience?

For example, social media companies generate the majority of their


income by selling targeted advertising based on customer data that
has been mined using algorithms or formulas. Of course, these
companies will argue that they are not ‘selling’ customer data, but
‘sharing’ customer data with their marketing partners.

You can make up your own mind!

Were you able to think of at least one example?

A cybercriminal can take advantage of your relationships, accessing


your online accounts and appealing to your good nature to try and
trick you into wiring money to your friends or family in a time of need.
For example, there have been many reported cases of hackers
impersonating family members and sending messages stating that
they need money wired in order to get home from abroad after losing
their wallets.

And while you may think that your frequent flyer air miles are not
valuable to cybercriminals, think again. In 2015, cybercriminals hacked
approximately 10,000 American Airlines and United accounts, booking
free flights and upgrades using stolen credentials. Even though the
frequent flyer miles were returned to the customers by the airlines, this
example demonstrates the value of your login credentials.

You might also like